First published: Tue Jun 14 2005(Updated: )
Multiple HTTP Response Splitting vulnerabilities in osCommerce 2.2 Milestone 2 and earlier allow remote attackers to spoof web content and poison web caches via hex-encoded CRLF ("%0d%0a") sequences in the (1) products_id or (2) pid parameter to index.php or (3) goto parameter to banner.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oscommerce Oscommerce | =2.2_ms1 | |
Oscommerce Oscommerce | =2.2_ms2 | |
Oscommerce Oscommerce | =2.2_cvs | |
Oscommerce Oscommerce | =2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1951 is considered a medium severity vulnerability due to its potential for content spoofing and cache poisoning.
To fix CVE-2005-1951, upgrade osCommerce to a version that is not affected by this vulnerability, such as the latest stable release.
CVE-2005-1951 affects osCommerce versions 2.2 Milestone 2 and earlier, including 2.1 and 2.2 CVS.
Exploiting CVE-2005-1951 can allow attackers to manipulate web content and potentially deceive users or poison cached content.
Yes, CVE-2005-1951 can be exploited remotely by attackers using specifically crafted parameters.